You are on page 1of 19

A.

Vijay Kumar 08D41A0524 CSE-A IV year Sri Indu Colege of Engg & Tech
www.powerpointpresentationon.blogspot.com

Background Terminology Applications Techniques Types References

What is a watermark ? A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill)

Application for print media authenticity of print media

Information Hiding..started with


Steganography (art of hidden writing):
The art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message The existence of information is secret.

Stego Hidden , Graphy Writing art of hidden writing

Germans used Microchips in World War II

Initial Applications of information hiding Passing Secret messages

Digital Watermarking: Application of Information hiding (Hiding Watermarks in digital Media, such as images) Digital Watermarking can be ? - Perceptible (e.g. author information in .doc) - Imperceptible (e.g. author information in images)
Visibility is application dependent Invisible watermarks are preferred ?

Copyright Protecton:To prove the ownership of digital media

Eg. Cut paste of images

Hidden Watermarks represent the copyright information

Tamper proofing: To find out if data was tampered.


Eg. Change meaning of images

Hidden Watermarks track change in meaning

Issues: Accuracy of detection

Quality Assessment: Degradation of Visual Quality

Loss of Visual Quality

Hidden Watermarks track change in visual quality

Watermarking Vs Cryptography Watermark D Hide information in D Encrypt D Change form of D

Data (D), Watermark (W), Stego Key (K), Watermarked Data (Dw) Embed (D, W, K) = Dw Extract (Dw) = W and compare with W
(e.g. find the linear correlation and compare it to a threshold)
Q. How do we make this system secure ? A. K is secret (Use cryptography to make information hidden more secure)

1) Techniques for Texts

1.1) Line Coding: Change the spacing between lines.

1.2) Word-shift Coding: Change the spacing b/w words

1.3) Character Encoding: Alter the shapes of characters.

2) Techniques for Images


2.1)Spatial Watermarking: Just change some of the values of the pixels in the bit plane; e.g., Change some of the bits from 1 to 0 or 0 to 1. lower

2.2)Frequency Domain Watermarking: First convert the image to the frequency domain and then apply the watermark in the low frequency regions.

Types of Water Marks


Watre Marking

According to working domain

According to type of document

According to human perception

According to application

Special Domain

Frequency domain

Source Based

Destination Based

Text

Video

Audio

Image

Visible

Invisible

Robust

Fragile

Private

Public

Invertible

NonInvertible

QuasiInvertible

NonquasiInvertible

Types of Water Marks

1. Visible watermarks:
watermarks are applicable to images only. The drawbacks of visible watermarks are degrading the quality of image

2. Invisible watermark:
Invisible watermark is hidden in the content. It can be detected by an authorized agency only

3. Public watermark:
Such a watermark can be read or retrieved by anyone using the specialized algorithm. In this sense, public watermarks are not secure.

4. Fragile watermark:
Fragile watermarks are also known as tamper-proof watermarks. Such watermarks are destroyed by data manipulation.

Types of Water Marks

1. Private Watermark: Private watermarks are also known as secure watermarks. To read or retrieve such a watermark, it is necessary to have the secret key. 2. Perceptual watermarks: A perceptual watermark exploits the aspects of human sensory system to provide invisible yet robust watermark. Such watermarks are also known as transparent watermarks that provide extremely high quality contents. 3.

Bit-stream watermark:
The term is sometimes used for watermarking of compressed data such as video.

Types of Water Marking


Video watermarking Video watermarking can be considered as a superset of normal image watermarking. As such, all the techniques applicable to static images can be applied to video images. Audio watermarking Audio watermarking is currently at the forefront of technology development in an attempt to prevent illegal reproduction and redistribution. One implementation receiving widespread attention is the MP3 approach to audio compression and watermarking. Text watermarking Watermark information can be embedded into a formatted document using an approach based on the slight adjustment of inter-line and inter-word spacings. Another approach to watermark embedding is to consider the typeset text as one large image and thus to use the typical approaches used for images

Requirements of Water Marking


The watermark must be difficult or impossible to remove, at least without visibly degrading the original image, The watermark must survive image modifications that are common to typical image-processing applications (e.g., scaling, color requantization, dithering, cropping, and image compression), An invisible watermark should be imperceptible so as not to affect the experience of viewing the image, and .

http://en.wikipedia.org/wiki/Steganography http://en.wikipedia.org/wiki/Digital_watermark http://www.cypak.com/pictures/med/Cypak%20 THANK YOU !

You might also like